Cryptography, Authentication and Digital Signatures
Cryptography, Authentication and Digital Signatures
com
1
What is Security....?
Security means protecting information and
information systems from unauthorized
access, use, disclosure, disruption,
modification, or destruction.
2
Security in Distributed Systems
Security is by no means the least important principle of
distributed system.
3
Security in distributed systems can roughly
be divided into two parts:-
1. One part concerns the communication
between users or processes, possibly
residing on different machines.
4
Attacks, Services and
Mechanisms
Security Attack: Any action that compromises the
security of information.
Security Mechanism: A mechanism that is
designed to detect, prevent, or recover from a
security attack.
Security Service: A service that enhances the
security of data processing systems and
information transfers. A security service makes
use of one or more security mechanisms.
5
Security Attacks
6
Security Attacks
Interruption: This is an attack on availability
Interception: This is an attack on confidentiality
Modification: This is an attack on integrity
Fabrication: This is an attack on authenticity.
In fabrication an unauthorized party counterfeits an
asset.
Example:- an intruder may add records to an
existing database.
7
Security Goals
Confidentiality
Integrity
Avaliability
8
• Confidentiality:ability to ensure that
messages and data are available only to
those authorized to view them.
– Encryption is used to achieve
confidentiality.
10
Cryptography
It is the art and science of achieving security
by encoding messages to make them non-
readable.
11
Encryption
Encryption: The process of transforming
plain text or data into cipher text that
cannot be read by anyone other than the
sender and receiver
Purpose:
Secure stored information
Secure information transmission
Provides:
Message integrity
Nonrepudiation
Authentication
Confidentiality
12
plaintext
cryptography
encryption decryption
ciphertext
fubswrjudskb
13
Symmetric Key Encryption
Also known as secret key encryption.
Both the sender and receiver use the same
digital key to encrypt and decrypt message
Requires a different set of keys for each
transaction.
Data Encryption Standard (DES): Most widely
used symmetric key encryption today; uses 56-
bit encryption key; other types use 128-bit keys
up through 2048 bits.
14
Symmetric Key Cryptography
plaintext
cryptography
encryption decryption
ciphertext
INTELLIGENCE
INTELLIGENCE PROBLEM (WWII):
fubswrjudskbPROBLEM (WWII):
Alice
Alicewants
wantstotosend
sendaacrypted
cryptedmessage
messageto
toBob.
Bob.
They
Theyneed
needto
toshare
sharethe
thesame
samekey.
key.
Alice
Alicecreated
createdaakey,
key,but
buthow
howto
tolet
letBob
Bobknow
knowit?
it?
15
KEY MAY BE INTERCEPTED!!!
16
The Key Distribution Problem
• In general, there are two ways to pass a
shared symmetric key between customer and
merchant (M) :-
1. First, customer X can obtain the shared
symmetric key from M’s physical office.
2. Merchant and customer can obtain the shared
symmetric key from a trusted party (key
distribution centre) through a secure channel.
– After establishing the first shared secret key,
the merchant and the customer can also
change the secret key regularly by encrypting
the new key with the old key.
17
Symmetric Key Encryption
Algorithm
Data Encryption Standard (DES):-
encrypts 64-bit data blocks through many
stages of transposition and substitution
techniques, using a 56-bit encryption key.
18
Public Key Encryption
• Uses two mathematically related digital keys –
public key (widely disseminated) and private key
(kept secret by owner).
19
plaintext
cryptography
encryption decryption
public private
key ciphertext key
fubswrjudskb
Asymmetrical Cryptography
20
Asymmetrical Cryptography makes it possible
to use separate keys for encryption and
decryption.
21
Public Key Cryptography
1. Bob creates a pair
of different keys
DECRYPTION
KEY
2. Bob sends one of the keys to Alice
ENCRYPTION
KEY
22
Public Key Cryptography – A Simple Case
23
plaintext
cryptography
encryption decryption
public private
key ciphertext key
fubswrjudskb
Electronic Signature
24
Asymmetrical Cryptography makes it possible
to use separate keys for encryption and
decryption.
25
One application of cryptography in distributed
systems is the use of hash functions.
26
Message Hash Function Message digest
27
Requirements of a Message Digest
Given a message, it should be very easy to find
its corresponding message digest.
32
Encrypt with
Message Digest Sender’s Private Key Digital Signature
33
Digital Signatures
34
Digital Certificates
35
Conclusion
Security plays an extremely important role in
distributed systems.
36
37